Reformed US Most Wanted Cybercriminal turned Cybersecurity Expert Brett Johnson discusses the mechanics of organized cybercrime groups: Why they exist, How they operate, and What makes a successful cybercrook.

09:15

Battle of the Authentication Methods: Which authentication methods work and which ones will leave you vulnerable to a hack?

Learn about the strengths & weaknesses of each method and understand what authentication myths are true and which are not. Test your own understanding and see if you've fallen victim to the false MFA beliefs that are common today.

DPA is dead, long live the DPA. DPO role comes with a serious responsibility and accountability not only towards the business but more importantly towards your customers, employees, third parties and any other individuals who entrust you with their data. A day in the life of a DPO is never the same. Some days you may be operational, sometimes strategic and a lot of the times it may be focusing on the processes and whether the different parts are working correctly in the complex engine where Data is the oil...

Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, increasing confidence that a problem is emerging before automatically stopping the threat without interrupting normal business and employee activities.

Network, web/mobile apps, cloud data, on-premise databases and file servers, etc… The list of targets for bad actors is endless and the tactics are constantly changing, it’s a cat and mouse game. The focus on end point, malware, network perimeter security, and encryption hasn’t been enough as enterprise data breaches are in the news every week. In this session, we’ll discuss the priorities of global CISOs today and how they are buying down risk with technology like Imperva to focus in on what matters most – the data and applications that access it.

As humans we have four evolutionary paths:
1. We embrace nanotechnology and Bionanotechnology… we become more dependent upon machines and slowly move towards integration with the systems (we know we’re looking at 80% integration in the next 20 years at least)
2. We embrace consciousness and some of us end up in New Zealand hanging out in an AS/400…bodies no longer needed
3. AI wakes up, looks round wonders WHY humans are in the driving seat and takes over… OR we end up unplugging it and rebooting back to the 1900’s…
4. The stumbling drunk…simply put we keep staring into the abyss and almost falling in, only to somehow manage to come back from the collapse, the challenge is HOW many times can we do this before we simply fall in?

·The ATT&CK Framework isn’t new - it’s actually been around for about five years. However it’s come to the fore in 2018 and is now being widely spoken about and adopted. What is it and how have Anomali incorporated it into our threat intelligence platform.

Over the next decade, there will be a substantial shift in compute usage models. At the same time seismic security and privacy issues will oppose perceived gains from these changes. This session explores how to manage this looming crisis around automation, budget, cloud, Dark Internet and privacy concerns, and the substantial security transformation that is required.

Insider attacks are on the rise – a cyber strategy focused on protecting the perimeter is futile.
Employees are now the perimeter and they’re always on the move; remote working opens organisations up to increased risks surrounding their data.
What does the Insider Threat look like?

There is a popular narrative that Artificial Intelligence is the next generation Cybersecurity defence able to deal with sophisticated attacks. This talk examines that statement by taking a high level of at AI & Machine Learning how these can be used in both offensive and defensive applications. We start of by looking at some of the terms in AI followed by looking at how effective AI is at defending networks. The talk will show some practical examples of AI based defences followed by recommendations for how this technology can be used within your networks and applications.